OSINT CASE STUDY: Colombian Government Infrastructure I conducted a full open-source intelligence analysis on Colombia's presidential digital infrastructure. KEY FINDINGS: Military Infrastructure Enumeration: - 421+ military subdomains discovered - ejercito.mil.co (Army) - 147 subs, Oracle servers exposed - armada.mil.co (Navy) - 94 subs, ArcGIS server - fac.mil.co (Air Force) - 79 subs, GitLab found - Internal Army IPs exposed (200.122.226.0/24) Police AI Platform (ia.policia.gov.co): - 10 AI tools: NADIA, ANTICIPACION, HOUNDOC, AITRANSCRIBE - Amazon Bedrock backend, AWS Account ID exposed - Predictive policing, document analysis, crime mapping ArcGIS Server (ergit.presidencia.gov.co): - 300+ map services publicly accessible - No authentication required - Armed group territorial maps (ELN, AGC, EMC, FARC dissidents) - 24 FARC reintegration camp coordinates Violence & Human Rights Data: - 1,822 homicide records (2016-2025) - 490 massacre incidents - 785 indigenous reserves mapped Credentials Extracted: - 494 email addresses (113 .gov.co) - 103 hashes/GUIDs - AWS credentials & session cookies captured All data gathered through legal OSINT methods: - Certificate transparency logs - Public DNS enumeration - Unauthenticated API endpoints Full dataset + interactive maps: github.com/Ringmast4r/Colombia ringmast4r.github.io/Colombia/HTML/maps_index.html #OSINT #CyberSecurity #Colombia #Intelligence